The vulnerabilities affect everyone, if you read the research documents back when they first released them it runs via java which means every borwser can be an attack ventor. Also they state they had a proof of concept attack via firefox. They also show a video of stealing browser history etc from a browser and that your location can be stolen over tor and a vpn.
Now things are much worse, they can now steal a hash in seconds and pull off more attacks. The patches that were ment to protect us can't protect us from the developed attacks. They seem to help the attacker.
The latest updates show stealing the AES-NI Key. See 6.1 https://zombieloadattack.com/zombieload.pdf "On average, we recovered the entire AES-128 key of the victim in under 10s using the cache-based trigger and the Dominoattack."
Stealing data from your browser. Keyword Detection and URL Recovery. 6.4 Browsing-Behavior Monitoring " evaluated both attacks running an unmodified Firefox browser version 66.0.2 on the same physical core as the attacker." page 12 "same physical core", I would guess means HT off. Results https://zombieloadattack.com/zombieload.pdf
So that would be your online privacy at risk.
Now things are much worse, they can now steal a hash in seconds and pull off more attacks. The patches that were ment to protect us can't protect us from the developed attacks. They seem to help the attacker.
The latest updates show stealing the AES-NI Key. See 6.1 https://zombieloadattack.com/zombieload.pdf "On average, we recovered the entire AES-128 key of the victim in under 10s using the cache-based trigger and the Dominoattack."
Stealing data from your browser. Keyword Detection and URL Recovery. 6.4 Browsing-Behavior Monitoring " evaluated both attacks running an unmodified Firefox browser version 66.0.2 on the same physical core as the attacker." page 12 "same physical core", I would guess means HT off. Results https://zombieloadattack.com/zombieload.pdf
So that would be your online privacy at risk.
Last edited: